Design of policy-based security management for intrusion detection

被引:0
|
作者
Jo, SH [1 ]
Kim, JN [1 ]
Soh, SW [1 ]
机构
[1] ETRI, Informat Secur Res Div, Taejon, South Korea
关键词
IDS; COPS; IPsec; policy based security management;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a next generation security solution that minimizes the damage of hacking, in case a firewall fails in the isolation of intrusions, and responds the intrusion dynamically. Legacy security management is difficult to deal with changes in security environments, because it lacks of security policies and integrated security methods. In order to resolve these problems, we need policy-based security management (PBSM) that has standard security policy, consulting, diagnosis, maintenance, and repair function. It is necessary to monitor and control security services by PBSM. In this paper, we design and implement PBSM for intrusion detection. Our platform consists of a network node, general hosts and a management node. The network node is a security router that performs packet filtering, intrusion detection, intrusion analysis, intrusion response, and policy enforcement. The management node manages a network node and general hosts by security policies. We design the channel between a management node and a network node using Common Open Policy Service (COPS) and IP Security (IPsec). We have applied java and web to implementing GUI for PBSM. Java is used to program the user interface for PBSM. As the proposed system makes use of web, PBSM is easily accessed through the web remotely in real time. As the proposed system makes use of Web, security management system is easily accessed through the Web.
引用
收藏
页码:337 / 340
页数:4
相关论文
共 50 条
  • [21] The design of service management system using policy-based network management
    Ok, KS
    Ha, JH
    Choi, SH
    Ahn, CH
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 295 - 300
  • [22] Design of policy-based security mechanisms in a distributed web services architecture
    Casola, Valentina
    Mazzeo, Antonino
    Mazzocca, Nicola
    Venticinque, Salvatore
    APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 454 - 463
  • [23] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [24] The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET
    Cheng, Yuu-Heng
    Raykova, Mariana
    Poylisher, Alex
    Alexander, Scott
    Eiger, Martin
    Bellovin, Steve M.
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 174 - 177
  • [25] The Design and Implementation of PolicyEngine In Policy-based Satellite Network Management
    Pan, Chengsheng
    Jiang, Yueqiu
    Luo, Yang
    Sun, Kun
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 8907 - +
  • [26] Scalable design of a policy-based management system and its performance
    Law, KLE
    Saxena, A
    IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (06) : 72 - 79
  • [27] Policy-based proactive monitoring of security policy performance
    Bogdanov, Vitaly
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 197 - +
  • [28] Policy-based IPsec management
    Li, M
    IEEE NETWORK, 2003, 17 (06): : 36 - 43
  • [29] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [30] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105